7.5 The Device Investigation Page
The Device Investigation Page
By the end of this subsection, you will be able to read a device timeline, identify malicious process chains, and use the device page for investigation alongside KQL.
The device page in Defender XDR is the single-device investigation interface. It combines the device timeline (every process, network connection, file event, and registry change), device properties, security recommendations, and response actions in one view.
The device timeline
The timeline is a chronological view of everything that happened on the device. It is the most detailed investigation data source for endpoint activity — more granular than the aggregated tables in Advanced Hunting.
Event types in the timeline:
| Event type | What it shows | Investigation value |
|---|---|---|
| Process creation | Parent → child process chain, command line arguments | The #1 investigation signal. Malware execution chains are visible here. |
| Network connections | Destination IP/domain, port, process that initiated | C2 communication, data exfiltration, lateral movement |
| File events | File creation, modification, deletion with path and hash | Malware dropping payloads, evidence tampering |
| Registry events | Key creation, modification, deletion | Persistence mechanisms (Run keys, services, scheduled tasks) |
| Logon events | Local and remote logon with source IP and account | Lateral movement via RDP, PSExec, WMI |
| Alert events | Alerts raised on this device with severity | Correlated view of what Defender detected |
Reading a malicious process chain
The most critical skill for device investigation is reading the process tree — the parent-child relationship between processes.
Normal process chain: explorer.exe → outlook.exe → winword.exe (user opens Outlook, opens a Word attachment). This is a legitimate chain.
Malicious process chain: winword.exe → cmd.exe → powershell.exe → mimikatz.exe
This means: Word executed a macro that launched cmd, which launched PowerShell, which launched Mimikatz (credential dumping). Each step is a red flag:
- Word spawning cmd.exe = macro execution (ASR rule target)
- cmd spawning PowerShell = script execution (common malware delivery)
- PowerShell spawning mimikatz = credential theft (immediate containment)
| |
| Time | GrandParent | Parent | Child | CommandLine |
|---|---|---|---|---|
| 09:14 | winword.exe | cmd.exe | powershell.exe | powershell -enc aQBl... |
| 09:14 | cmd.exe | powershell.exe | mimikatz.exe | mimikatz "privilege::debug" "sekurlsa::logonpasswords" |
-enc flag on PowerShell means Base64-encoded command (attackers hide payload content this way). Mimikatz with sekurlsa::logonpasswords dumps all credentials from LSASS memory. This is a complete initial access → execution → credential theft chain. Containment is immediate: isolate the device, revoke the user's sessions.What to check on every device investigation
When you open a device page during an incident, check these five things in order:
- Alert timeline — what triggered the investigation? Read the alert details first.
- Process tree for the alert — click the alert to see the process chain. Read parent → child → grandchild.
- Network connections from suspicious processes — did the malicious process connect to an external IP? That is likely C2.
- File events — did the process create or modify files? Look for new executables, scripts, or persistence mechanisms.
- Logon events — did a new account log on around the time of the alert? That could be lateral movement from another compromised device.
Network connection analysis from the timeline
After identifying a suspicious process, the next step is checking its network connections. C2 communication is the confirmation that the process is not just suspicious but actively communicating with the attacker.
| |
| Time | Process | RemoteUrl | RemoteIP | Port |
|---|---|---|---|---|
| 09:15 | powershell.exe | c2-server.malicious-domain.com | 203.0.113.99 | 443 |
| 09:14 | powershell.exe | c2-server.malicious-domain.com | 203.0.113.99 | 443 |
File event analysis — what did the process drop?
| |
| Time | FileName | FolderPath | SHA256 |
|---|---|---|---|
| 09:15 | svchost-update.exe | C:\Users\j.morrison\AppData\Local\Temp | a3f8b2c1d4... |
Try it yourself
| |
This joins process creation with network events from the same process within a 60-second window. Any PowerShell process that makes a network connection shortly after spawning is worth investigating — it may be downloading a payload.
Check your understanding
1. You see winword.exe → cmd.exe → powershell.exe -enc [base64] in the device timeline. What is the correct interpretation?
2. What is the first thing to check when the process tree shows a network connection from a suspicious process?